Learn More
The word “cyber law” encompasses all the cases, statutes and constitutional provisions that affect persons and institutions who control the entry to cyberspace, provide access to cyberspace, create the hardware and software which enable people to access cyberspace or use their own devices to go “online” and enter cyberspace. In(More)
Segmentation of medical images is a very difficult and challenging task due to many inherent complex characteristics present in it. Moreover in many practical situations, medical images are captured at low measurement spaces i.e. at compressed sensing (CS) paradigm for a variety of reasons, for example, due to the limited number of sensors used or(More)
Among the different types of tumor in human body, brain tumor is one of the most life-threatening diseases and it should be detected accurately in early stage for proper treatment. Recently magnetic resonance imaging (MRI) is found to be efficient in detecting tumor as it does not need any opening on the human body. Presence of tumor in brain may be(More)
Secret sharing is a means of data protection by splitting it into few noise-like shares. However, transmission of shares (digital information), through radio mobile channel, experience the multipath effect called the fading effect that sometimes leads to severe degradation in the quality of the reconstructed data. This paper proposes a strong threshold (n,(More)
Segmentation of medical images is a very difficult and challenging task due to many inherent complex characteristics present in it. Again in many practical situations, medical images are captured at low measurement spaces i.e. at compressed sensing (CS) paradigm for a variety of reasons, for example, due to the limited number of sensors used or measurements(More)
  • 1